Proceedings of The Intl. Conf. on Information, Engineering, Management and Security 2014 [ICIEMS 2014]
260
Protect Confidential Information in PPH Cloud Environments by Using End-End Access in Secure Way
as df .re s. in
M. Rama Raju Asst. Professor, Department of Computer Science & Engineering, ChristuJyoti Institute of Technology & Science, Jangaon, Warangal, A. P. India.
w w w .e dl ib .
Abstract— In Cloud computing PPH private public and hybrid respectively the cloud environments are available in now a days. Cloud computing has many benefits and security challenges in various cloud environments. But regarding some business-critical applications, the organizations, especially large enterprises, still may not move them to cloud. The market size of the cloud computing shared is still far behind the one’s expectation. From the consumer’s perspective, cloud computing security concerns, especially protecting critical information in various cloud environment issues, remain the primary inhibitor for adoption of cloud computing services. This paper provides the benefits and security challenges in various cloud environment and techniques and solution for various issues of security challenges of various cloud environments. Finally, this paper describes future research work about protecting critical information in cloud by using all these techniques to overcome time process by using utilities in cloud computing by the reduce cost by performing better way. Keywords: Cloud Computing, Security, and End – End access.
I. Introduction
D ow nl oa de d
fro m
Cloud computing introduced new business models, provide more services, and reduce IT costs. Cloud computing technologies can be implemented in a wide variety of architectures, like different service and deployment models, and can coexist with other technologies and software design approaches. The global cloud computing market is grow from a $40.7 billion in 2011 to $241 billion in 2020, according to Forrester Research. On the way to all of the growth are a few notable reports. •
• •
For starters, the infrastructure as a service market will peak a $5.9 billion in global revenue in 2014 and then commoditization, price pressure and falling margins. Business Process as a service will be notable, but face modest revenue. Virtualization will recede to the background as new technologies take over.
To determine whether the increased risks of truly worth the agility and economic benefits. Maintaining control over the critical information is paramount to cloud success. A decade ago, enterprise data typically resided in the organization’s physical infrastructure, on its own servers in the enterprise’s data center, where the sensitive data in individual physical servers. Today, with virtualization and the cloud, data may be under the organization’s logical control, but physically reside in infrastructure owned and managed by another entity. As we shown in figure 1. This shift in control is the number one reason new approaches and techniques are required to ensure organizations can maintain data security. When an outside party owns, controls, and manages infrastructure and computational resources, how can you be assured that business or regulatory data remains private and secure, and that your organization is protected from damaging data breaches—
ICIEMS 2014
ISBN : 978-81-925233-3-0
www.edlib.asdf.res.in / www.iciems.in